Which of the following parameters describe LM Hash (see exhibit):
Exhibit:
A. I, II, and III
B. I
C. II
D. I and II
The LM hash is computed as follows:
1. The users password is restricted to a maximum of fourteen characters.
2. The user-s password is converted to uppercase.
Etc.
14 character Windows passwords, which are stored with LM Hash, can be cracked in five seconds.
References: https://en.wikipedia.org/wiki/LM_hash